Dcom Exploit


Advertisement

Sophos Windows Shortcut Exploit  v.1.0.1

The Windows Shortcut Exploit Protection tool runs whenever Windows tries to display an icon corresponding to a Windows shortcut. The tool intercepts this request and validates the shortcut. If the shortcut does not contain an exploit, the icon is displayed.

Windows Shortcut Exploit Protection Tool  v.1.0.0

Detects and blocks the Windows Shortcut Exploit. The Windows Shortcut Exploit Protection tool runs whenever Windows tries to display an icon corresponding to a Windows shortcut. The tool intercepts this request and validates the shortcut. If the shortcut ...





Advertisement

DCoM SWF Optimizer

SWF Optimizer is a remarkable utility that replaces a tag by a shorter one, proclaims a tag short if it can be short, removes ActionScripts that don`t contain any meaningful commands, removes multiple ExportAssets tags of the same object, removes comments, ...

Exploit Submission Wizard  v.8. 2. 2001

The program was designed from the outset to offer all web users the ability to submit sites fully automatically to the ever increasing number of search engines on the net without hassle or complication, and in a fraction of the time and cost normally ...

DCoM SWF Optimizer for Linux  v.1.0

SWF Optimizer performs the following optimization features:
For a single file:
1. Replaces a tag by a shorter one.
2. Proclaims a tag short if it can be short and its length is less than 63 bytes.
3. Removes ActionScripts that dont contain ...

DCoM SWF Protector  v.1.0

Site and game developers try to protect their developments codes. However, it becomes more and more difficult because of different SWF decompilers. SWF Protector is ready to help you to protect your Flash developments codes.
SWF Protector uses 3 protection ...

DCoM SWF Protector for Linux  v.1.0

Site and game developers try to protect their developments codes. However, it becomes more and more difficult because of different SWF decompilers. SWF Protector is ready to help you to protect your Flash developments codes.
SWF Protector uses 3 protection ...

Antibody Anti-Exploit  v.0.1

Antiexploit framework for home, business, or server use. Completely opensource, and free(as in free beer). Antibody doesn't use a signature database, instead it emulates the possible threat to find out whats really going on.

GFI MailSecurity for Exchange/SMTP

GFI MailSecurity for Exchange/SMTP is an email content checking, exploit detection, threats analysis and anti-virus solution that removes all types of email-borne threats before they can affect an organizations email users. Using multiple virus scanners ...

Quttera

Quttera is a Signatureless Malicious Content Detection Solution designated especially to identify the potentially malicious executable code, zero-day vulnerability exploit and shellcode embedded into computer files such as movies, images, documents and ...

SocketShield  v.1.1.1

SocketShield is a dedicated zero-day exploit blocker. Using a combination of research technologies and an understanding of anti-malware techniques, the program is able to block exploits from entering your computer, regardless of how long it takes for ...

Privacy Restorer

Its an open book for all to seeand exploit. With a simple mouse click, award-winning Privacy Restorer permanently removes the history of your activities on a PC.

Space Empires V  v.1 79


Plot:
In this game you will be able to explore, expand, exploit and exterminate. This is known as the four x for the old gamers.

As in the previous games of this saga, you will have to start in a small planet with some resources ...

ASSP Toolbar for Outlook  v.1. 1. 2029

The toolbar integrates with Outlook, making it a breeze to exploit ASSP's email interface.

ASSP Toolbar for Outlook can also be fully managed by a network administrator. The product offers easy deployment via an MSI-based installer, full Group ...

SQL Power Injector  v.1 2

1 that helps the penetration tester to find and exploit SQL injections on a web page.

For now it is SQL Server, Oracle, MySQL, Sybase/Adaptive Server and DB2 compliant, but it is possible to use it with any existing DBMS when using the inline ...

Pages : 1 | 2 >
Newest Reviews